Under construction

New design coming soon!

CIC News engine statistics

CIC News for 04-04-2014 contains 44 articles: cybercrime(18),cyber security(10),data breach(8),other(8)


CIC News update contains 40 English and 4 Dutch articles for today.
In today's English news articles:
- 16 related to cybercrime
- 10 related to cyber security
- 8 related to data breach and identity theft
- 6 for the category other news


In today's Dutch news articles:
- 2 related to cybercrime
- 0 related to cyber security
- 2 for the category other news

Have fun reading.

English cybercrime related news

Two held for duping youth with job offers in IT majorLocation: Pune
Date published: 03-04-2014

HYDERABAD: Cyber Crime sleuths have arrested two persons who had duped unemployed youth to the tune of Rs 3 lakh by promising jobs in Tech Mahindra. Police have arrested V Radha Krishna, 33, from Addagutta, and P Millu Singh, 33, from Karkhana. Posing as human resources (HR) team membe... Read more

Source: timesofindia.indiatimes.com

Top found tags: cybercrime(2),financial sector(2),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Most Common Forms of DDoS AttacksLocation: New York, United States
Date published: 03-04-2014

Although its honestly one of my least favorite sayings as an animal lover, there are indeed many ways to skin a cat. There are also many ways to take down a website or network of sites with Distributed Denial of Service (DDoS) attacks. The goal is always the same to overload the target with ... Read more

Source: www.blacklotus.net

Top found tags: DoS(2),website(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ukraine to Get Its Own Social Network Once the DDoS Attacks StopLocation: Ukraine
Date published: 03-04-2014

Ukraine may soon get its very own social network, Mashable has learned, but its debut is being delayed by ongoing DDoS attacks.The social network, which will live at WeUA.info (slogan: "We live for Ukraine), was scheduled to go live Monday night, but has not been able to launch due to a sustained a... Read more

Source: mashable.com

Top found tags: social media(2),Ukraine(2),United Kingdom(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Denial-of-Service Attacks Continue to Grow in Sophistication, CapacityLocation: Incapsula HQ - Redwood Shores, United States
Date published: 03-04-2014

Large-packet and reflection attacks ratchet up the bandwidth of denial-of-service in the first three months of 2014, according to a report from Web security firm Incapsula. Massive distributed denial-of-service attacks using infrastructure servers to amplify floods of data have garnered much attent... Read more

Source: www.eweek.com

Top found tags: threat(1),DoS(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
24 Million Home Routers and ISPs Open to DNS DDoS Amplification AttacksLocation: London, United Kingdom
Date published: 02-04-2014

A new report from Nominum, which provides ISPs with DNS based analytics and monetization solutions, has claimed that 24 million home broadband routers, including many in the UK,could be exposing ISPs and their users to becoming unwitting participants in massive Internet DNS-based Distributed Denial... Read more

Source: www.ispreview.co.uk

Top found tags: trojan(2),United Kingdom(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
ATM Skimming Back In Boca RatonLocation: Boca Raton, United States
Date published: 02-04-2014

BOCA RATON, FL (BocaNewsNow.com) It has happened again. Police are investigating the skimming of ATM cards used at Publix presto machine in east Boca. Direct from Boca PD:Boca Raton Police Services Department detectives are investigating multiple thefts from ATMs via skimming... Read more

Source: bocanewsnow.com

Top found tags: skimming(1),telecom sector(4),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Billions spent on cyber security and much of it 'wasted'Location: Hewlett-Packard - Palo Alto, United States
Date published: 03-04-2014

The global IT security budget runs into tens of billions of dollars but much of it is not being used effectively, say security experts.ABI Research estimated that cyber security spending for critical infrastructure the segments of defence, energy, financial, healthcare, ICT, public security, tr... Read more

Source: www.smh.com.au

Top found tags: health sector(2),medical sector(2),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
24,000 computers worldwide infected by Middle Eastern malwareLocation: New York, United States
Date published: 02-04-2014

Experts have discovered a remote access tool (RAT) that has infected 24,000 computers worldwide, and has been used by up to 487 criminal groups.Dubbed njRAT, the malware shares similar functions as other RATs, but its most unique attribute stems from its regional usage, according to a blog post by ... Read more

Source: www.scmagazine.com

Top found tags: cybercrime(2),government(2),malware(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Brierfield Mill cyber-crime base to create thousands of jobsLocation: Lancashire
Date published: 03-04-2014

A proposal for a cyber-crime fighting hub is being made as a part of Brierfield Mill's 25m vision, which would create 2,250 jobs in the process. Joe Cooney, leader for Pendle Council, has confirmed that discussions are taking place to form the North-East Lancashire Cyber Security Business Park, a... Read more

Source: www.acumin.co.uk

Top found tags: EN(1),training(1),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Advanced attacks are the new normal, experts claimLocation: London, United Kingdom
Date published: 02-04-2014

Malware techniques are becoming ever more sophisticated, according to Websense Malware attacks are becoming increasingly sophisticated, with the old scatter-gun approach of generalised mass spam emails being abandoned in favour of more targeted attacks.This is one of the findings of Websenses an... Read more

Source: www.itpro.co.uk

Top found tags: threat(2),exploit kit(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Immigration raids cybercrime denLocation: Beijing, China
Date published: 03-04-2014

Immigration agents and police arrested 37 foreigners allegedly belonging to a cybercrime syndicate at a rented apartment in Paraaque City.Immigration intelligence chief Jose Carlitos Licas said 35 of the suspects Taiwan citizens while the two were from mainland China.They are now detained at Camp... Read more

Source: manilastandardtoday.com

Top found tags: Taiwan(1),China(2),cybercrime(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Nearly a Third of PCs Poised to Become Cybercrime TargetsLocation: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

As Microsoft readies the eulogy for Windows XP, data from security firm Trend Micro shows that nearly a third of PCs still run on the operating system leaving a wide swath of the PC user base susceptible to cybercriminal exploits. The official funeral for Windows XP support comes early next wee... Read more

Source: www.infosecurity-magazine.com

Top found tags: vulnerability(2),cybercrime(6),0-day(1)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
EU regulators warn banks to protect IT budgets in face of growing cyber threatLocation: New York, United States
Date published: 03-04-2014

Banks must ensure that IT budgets are protected to defend against a growing cyber threat, European Union has warned.According to a report from the Joint Committee of the European Supervisory Authorities, released on Wednesday, financial institutions experienced an increase in cyber incidents during... Read more

Source: www.computerworlduk.com

Top found tags: threat(1),EU(2),financial sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyberespionage, Not Cyber Terror, is the Major Threat, Former NSA Director SaysLocation: U.S.
Date published: 03-04-2014

CHANTILLY, VAThe list of threats on the Internet is long and getting longer each day. Cybercrime, nation-state attackers, cyber espionage and hacktivists all threaten the security and stability of the network and its users in one way or another. But the one threat that some experts have warned a... Read more

Source: threatpost.com

Top found tags: financial sector(2),United States(2),cyber espionage(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Kansas adds defensive barrier after cyberattack shuts down student testingLocation: Kansas, United States
Date published: 02-04-2014

A mysterious cyberattack on Kansas online student testing system has forced the state to shut down its exams until Thursday. The state on Wednesday put an extra barrier around the testing systems server that seems to have curtailed the assault, said Marianne Perie, co-director of ... Read more

Source: www.kansascity.com

Top found tags: report(1),education(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
One of Worlds Largest Websites Hacked: Turns Visitors into DDoS ZombiesLocation: Oracle - Redwood City, United States
Date published: 03-04-2014

Yesterday we mitigated a unique application layer DDoS attack against one of our clients. The attack was carried out using traffic hijacking techniques, which flooded our client with over 20 million GET requests originating from the browsers of over 22,000 Internet users - all turned into unwilling... Read more

Source: www.blogger.com

Top found tags: cybercrime(2),vulnerability(2),website(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

Media Release: New Privacy Alert Bill has made Internet Transactions a Vulnerable Point for Cyber Criminals.Location: Australian Communications and Media Authority - Pyrmont, Australia
Date published: 03-04-2014

EC Council Academy has a range of training programs specifically designed to prevent these malware programs from entering your systems. They range from beginner classes like the Certified Secure Computer User (CSCU) course to your more intermediate and advanced courses, like the Certified Ethical H... Read more

Source: www.cmo.com.au

Top found tags: cybercrime(3),government(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sality malware, growing old, takes on a new trickLocation: Google HQ - Mountain View, United States
Date published: 02-04-2014

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.The malware behind the botnet, called Sality, has been around since 2003, in part due to its use of digitally-signed communications and an efficient software design, wrote Benjamin Va... Read more

Source: www.pcworld.com

Top found tags: social media(2),telecom sector(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Android Botnet Targets Middle East BanksLocation: Google HQ - Mountain View, United States
Date published: 02-04-2014

I recently encountered a botnet targeting Android smartphone users who bank at financial institutions in the Middle East. The crude yet remarkably effective mobile bot that powers this whole operation comes disguised as one of several online banking apps, has infected more than 2,700 phones, and ha... Read more

Source: krebsonsecurity.com

Top found tags: United States(2),financial sector(6),telecom sector(12)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity business cyberwarfare critical infrastructureLocation: National Institute of Standards - Gaithersburg, United States
Date published: 03-04-2014

Many businesses and organizations, when applying cost-benefit analysis and a risk-management analysis to measure cyber risk, are relying on the assumption that the likelihood of a future attack depends heavily on how many attacks have occurred in the past. Since there has yet to be a full-scale att... Read more

Source: www.homelandsecuritynewswire.com

Top found tags: United States(4),government(5),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
The top security worry keeping businesses awake at night? Insider threatsLocation: Vormetric HQ - San Jose, United States
Date published: 03-04-2014

Today's modern business has to worry about stiff competition, rising energy prices, innovation, and how to poach talent to keep a corporation thriving as well as the persistent threat of cybercrime. However, new research suggests that within European organizations, one worry tops the rest: the ... Read more

Source: www.zdnet.com

Top found tags: security measures(2),United Kingdom(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
New DDoS Warning Issued Banking Industry BewareLocation: Federal Financial Institutions Examination Council - Washington D.C., United States
Date published: 03-04-2014

The Federal Financial Institutions Examination Council (FFIEC), today released advisory statements warning Financial Institutions of risks associated with cyber-attacks on ATMs, credit card authorization systems and the continued DDoS attacks against public-facing websites.It is encouraging to s... Read more

Source: www.securitybistro.com

Top found tags: ISP(2),cybercrime(3),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Malware: the top five myths uncoveredLocation: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

With computer security issues hitting the headlines almost daily, were all very familiar with terms such as malware, virus and security risk. Unfortunately, although most PC users make an effort to install some form of security software, many peoples preconceptions about mal... Read more

Source: bdaily.co.uk

Top found tags: cyber security(2),financial sector(2),cybercrime(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Russian trojan spotted attacking Middle Eastern banksLocation: Google HQ - Mountain View, United States
Date published: 03-04-2014

Security researcher Brian Krebs has spotted a Russian-controlled botnet being used to target banks in the Middle East. The campaign follows on from the use of the `Sandroid' malware - which is designed to look like a banking two-factor authentication (2FA) app - against banks and financ... Read more

Source: www.scmagazineuk.com

Top found tags: cybercrime(4),telecom sector(12),financial sector(14)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Securing Our National Critical Infrastructure: How Public-Private Partnerships Work Together to Address Rampant VulnerabilitiesLocation: National Institute of Standards - Gaithersburg, United States
Date published: 13-08-2013

It would seem that the more attention that is paid to cybersecurity threats to national critical infrastructure, the greater the number of issues that are uncovered. In February 2013, the Obama Administration released a presidential directive to address how we manage and secure critical infrastruct... Read more

Source: www.federaltechnologyinsider.com

Top found tags: DHS(4),government(6),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dangerous new Zeus Trojan fools antivirusLocation: Comodo Group HQ - Clifton, United States
Date published: 04-04-2014

A new and "extremely dangerous" version of the notorious Zeus malware has been discovered that can fool detection systems by hiding behind an apparently legitimate digital signature. The new virus was revealed by US vendor Comodo Antivirus Labs in a blog on April 3. The company has foun... Read more

Source: www.scmagazineuk.com

Top found tags: United Kingdom(2),cybercrime(4),financial sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Medical data breach involves more than 170,000 additional victimsLocation: Los Angeles
Date published: 03-04-2014

Los Angeles County officials said Thursday that 170,200 additional victims have been identified in a theft of medical data from a county contractor's office. The total number of county patients affected now stands at 338,700. The data was stored on eight computers taken in a Februarybreak-in at the... Read more

Source: www.latimes.com

Top found tags: medical sector(2),United States(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
25 in Miami Charged in Theft, Tax Fraud CaseLocation: Miami, United States
Date published: 04-04-2014

Twenty-five people accused of using thousands of stolen identities to claim $36 million in fraudulent tax refunds have been arrested in the latest South Florida sweep, federal authorities said Thursday. Among those charged in 19 separate cases is a middle school food service worker who swiped the i... Read more

Source: www.nbcmiami.com

Top found tags: government(2),identity theft(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Two arrested on FSUs campus plead guilty to fraud and identity theftLocation: Florida State University - Tallahassee, United States
Date published: 03-04-2014

Two men plead guilty in U.S. District Court Thursday to fraud and identity theft charges after they were found on Florida State Universitys campus with stole debit cards and cash obtained with them.Clifford Virgile, 25, of Tallahassee and Rodney Charles, 22, of Miami were arrested May 16 after F... Read more

Source: www.tallahassee.com

Top found tags: fraud(1),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
States Investigating Data Breach at Experian: ReportLocation: Experian HQ - Dublin,Ireland
Date published: 03-04-2014

U.S. attorneys general have launched a multistate investigation into a breach in which criminals gained access to a repository of some 200 million Social Security numbers through a unit of data provider Experian Plc."We are investigating," said Maura Possley, a spokeswoman for Illinois Attorney Gen... Read more

Source: www.nbcnews.com

Top found tags: data breach(2),identity theft(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data breach response leaves something to be desiredLocation: National Institute of Standards - Gaithersburg, United States
Date published: 03-04-2014

The number of government data breaches involving personal identifiable information has more than doubled since 2009, and the Government Accountability Office wants federal agencies to adhere more closely to existing security protocols to better protect peoples data.An April 2 GAO report found th... Read more

Source: fcw.com

Top found tags: medical sector(2),United States(4),government(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Allied World U.S. launches new data breach liability coverage productLocation: Allied World Assurance Company HQ - Baar, Switzerland
Date published: 03-04-2014

Allied World U.S., a unit of Allied World Assurance Company Holdings A.G., has launched Privacy//403 SRVS, a specified response vendor solution policy focusing on data breaches.The policy provides comprehensive coverage for the liability and expenses related to a data breach, the New York-based ins... Read more

Source: www.businessinsurance.com

Top found tags: cyber security(2),data breach(2),United States(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Victims double in LA County medical data breachLocation: Los Angeles
Date published: 03-04-2014

LOS ANGELES (AP) The number of patients identified in a medical data breach after a computer theft from a Southern California office has more than doubled. The Los Angeles Times (http://lat.ms/1pXtQPV) reports Thursday that more than 170,000 new patients have been identified whose Social Securi... Read more

Source: www.recorderonline.com

Top found tags: data breach(2),health sector(2),medical sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Minnesota court to hear all Target data breach casesLocation: Minnesota
Date published: 04-04-2014

(Reuters) - The U.S. Judicial Panel on Multidistrict Litigation ordered that the many lawsuits that accuse Target Corp of failing to protect customers from a data breach will be consolidated in the retailer's home state Minnesota. The order brings together 33 lawsuits across 18 district... Read more

Source: www.chicagotribune.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

Smart Grid: What Homeland Security wants utilities to know and doLocation: National Institute of Standards - Gaithersburg, United States
Date published: 03-04-2014

Quick Take: You know that NERC is developing more and more security mandates for utilities. And you may recall that two congressmen want the federal government to take over grid security. But don't forget that the U.S. Department of Homeland Security has its eyes on our industry, as demonstrated by... Read more

Source: www.smartgridnews.com

Top found tags: DHS(4),government(6),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Woman admits credit card fraud chargeLocation: Superior Court - Phoenix, United States
Date published: 04-04-2014

SUPERIOR COURT A Hamburg woman pleaded guilty to obtaining a credit card in someone elses name, the prosecutors office said.Jamie L. Ezzo, 34, entered the plea before Judge Thomas J. Critchley in state Superior Court in Newton on March 24 for third-degree fraudulent use of a credit card.S... Read more

Source: www.njherald.com

Top found tags: fraud(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Credit card fraud up 40% in 2013Location: Shanghai, China
Date published: 04-04-2014

MOST of the financial crime cases handled by local courts last year involved credit card fraud, the Shanghai Higher Peoples Court said yesterday.Of the 1,222 cases to reach court, 1,054, or 86 percent, were linked to credit card fraud, an increase of almost 40 percent from the previous year, it ... Read more

Source: www.shanghaidaily.com

Top found tags: mobile device(2),financial sector(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smart Grid: For utilities, banks, and other critical infrastructure providers, Y2K arrives April 8 2014Location: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

This is definitely a different article and subject area than my regular stories on microgrids, renewable energy, and the federal governments energy-related activities. However, after reading it, many will walk away thinking microgrid solutions are more viable than ever And, people that know m... Read more

Source: www.smartgridnews.com

Top found tags: smart grid(2),United States(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
XP EoL: Little Impact to ICS SecurityLocation: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

All the fuss and tension over the security impact of Windows XP reaching its end of life next week is wildly overblown for the ICS community.Yes there still are a lot of asset owners running Windows XP in their ICS environment. And yes, many of these asset owners are in critical infrast... Read more

Source: www.digitalbond.com

Top found tags: Windows(1),critical infrastructure(2),Microsoft(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
7 All-in-One Security Suites: Anti-Malware for All Your DevicesLocation: Microsoft HQ - Redmond, United States
Date published: 03-04-2014

Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe. That's... Read more

Source: www.cio.com

Top found tags: threat(1),Windows(1),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Grote diefstal wachtwoorden ontdektLocation: Berlin, Germany
Date published: 03-04-2014

VERDEN-In Duitsland is donderdag een grote datadiefstal aan het licht gekomen. Het gaat om 18 miljoen combinaties van e-mailadressen met wachtwoorden. Volgens de Duitse justitie zijn de gegevens afkomstig van alle grote Duitse internetproviders. Naar verluidt is het de grootste diefstal in zijn soo... Read more

Source: www.telegraaf.nl

Top found tags: Germany(2),identity theft(2),cybercrime(7)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
De gratis aartsvijand van malwareLocation: Malwarebytes - San Jose, United States
Date published: 04-04-2014

Malware, of schadelijke software, nestelt zich op je systeem met kwade bedoelingen. Hackers en andere duistere figuren zitten niet stil in hun steeds evoluerende zoektocht naar nieuwe manieren om jou te bedriegen en je systeem beschadigen, dus ook aan de andere kant van het spectrum moeten software... Read more

Source: www.zdnet.be

Top found tags: cyber security(2),United Kingdom(2),cybercrime(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

'24 miljoen thuisrouters open voor DDoS-aanval'Location: Amsterdam, The Netherlands
Date published: 02-04-2014

DNS-amplificatieaanval veruit populairst bij DDoS'ers, met dank aan miljoenen huis-, tuin-, en keukenmodems. DNS-reflectie of amplificatie blijft veruit de meest gebruikte methode van kwaadwillenden om sites en diensten plat te krijgen. Dat komt omdat niet alleen veel DNS-servers fungeren als open ... Read more

Source: webwereld.nl

Top found tags: NL(1),United Kingdom(2),vulnerability(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Google pakt spyware in Play Store aanLocation: Google HQ - Mountain View, United States
Date published: 02-04-2014

Google heeft de regels voor apps in Google Play aangepast in de hoop spyware beter te tackelen. Ook wil het de twijfelachtige tactieken van zogeheten grayware-verkopers aanpakken.Afhankelijk van hoe streng Google de zes nieuwe regels in de Google Play Developer Policies toepast, zullen Androidgebru... Read more

Source: www.zdnet.be

Top found tags: Google(3),Google Play(4),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish